Journal articles on the topic 'Wireless LAN Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Wireless LAN Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Andress, Mandy. "Wireless LAN Security." Information Systems Security 11, no. 3 (July 2002): 29–33. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37897.5.
Full textGholap, Prof Yuvraj N. "Study of Wireless LAN Security 802.11b." Indian Journal of Applied Research 4, no. 2 (October 1, 2011): 11–13. http://dx.doi.org/10.15373/2249555x/feb2014/73.
Full textHeld, Gilbert. "Overcoming Wireless LAN Security Vulnerabilities." Information Systems Security 11, no. 3 (July 2002): 22–27. http://dx.doi.org/10.1201/1086/43321.11.3.20020708/37896.4.
Full textPaulson, L. D. "Vendors push wireless LAN security." Computer 36, no. 1 (January 2003): 28. http://dx.doi.org/10.1109/mc.2003.1160051.
Full textGHERGHINA, Cătălina, and Gabriel PETRICĂ. "Wireless LAN Security Issues (II). Security Assurance." International Journal of Information Security and Cybercrime 3, no. 1 (June 28, 2014): 37–46. http://dx.doi.org/10.19107/ijisc.2014.01.04.
Full textFurnell, Steven, and Bogdan Ghita. "Usability pitfalls in Wireless LAN security." Network Security 2006, no. 3 (March 2006): 4–8. http://dx.doi.org/10.1016/s1353-4858(06)70343-9.
Full textBranch, J. W., N. L. Petroni, L. Van Doorn, and D. Safford. "Autonomic 802.11 wireless LAN security auditing." IEEE Security & Privacy Magazine 2, no. 3 (May 2004): 56–65. http://dx.doi.org/10.1109/msp.2004.4.
Full textWilliams, J. "Providing for wireless LAN security. 2." IT Professional 4, no. 6 (November 2002): 44–48. http://dx.doi.org/10.1109/mitp.2002.1114847.
Full textJyh-Cheng Chen, Ming-Chia Jiang, and Yi-Wen Liu. "Wireless LAN security and IEEE 802.11i." IEEE Wireless Communications 12, no. 1 (February 2005): 27–36. http://dx.doi.org/10.1109/mwc.2005.1404570.
Full textJiang, Qing Chao. "Analysis on Wireless LAN Security Issues and Security Implementation." Advanced Materials Research 1030-1032 (September 2014): 1657–59. http://dx.doi.org/10.4028/www.scientific.net/amr.1030-1032.1657.
Full textZeng, Li Li. "Wireless LAN Security Vulnerabilities and Improvement Measures." Applied Mechanics and Materials 543-547 (March 2014): 3335–38. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3335.
Full textFaheem, H. M. "Multiagent-based security for the wireless LAN." IEEE Potentials 24, no. 2 (April 2005): 19–22. http://dx.doi.org/10.1109/mp.2005.1462461.
Full textShe, Xin Ping, and Jian Ming Xu. "Wireless LAN Security Enhancement through Trusted Computing Technology." Applied Mechanics and Materials 577 (July 2014): 986–89. http://dx.doi.org/10.4028/www.scientific.net/amm.577.986.
Full textRegan, Kevin. "Wireless LAN Security: Things You Should Know about WLAN Security." Network Security 2003, no. 1 (January 2003): 7–9. http://dx.doi.org/10.1016/s1353-4858(03)00110-7.
Full textBadra, Mohamad, Pascal Urien, and Ibrahim Hajjeh. "Flexible and fast security solution for wireless LAN." Pervasive and Mobile Computing 3, no. 1 (January 2007): 1–14. http://dx.doi.org/10.1016/j.pmcj.2006.06.002.
Full textGHERGHINA, Cătălina, and Gabriel PETRICĂ. "Wireless LAN Security Issues (I). Types of Attacks." International Journal of Information Security and Cybercrime 2, no. 2 (December 28, 2013): 61–68. http://dx.doi.org/10.19107/ijisc.2013.02.07.
Full textCheng, Jiujun, Liufei Hu, Junjun Liu, Qingyang Zhang, and Chendan Yan. "A New Mechanism for Network Monitoring and Shielding in Wireless LAN." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/620926.
Full textAtarashi, H., I. Yamaguchi, H. Watanabe, R. Yamamoto, K. Ohe, and K. Tanaka. "Wireless LAN Security Management with Location Detection Capability in Hospitals." Methods of Information in Medicine 51, no. 03 (2012): 221–28. http://dx.doi.org/10.3414/me10-01-0002.
Full textChoi, Young B., Jeffrey Muller, Christopher V. Kopek, and Jennifer M. Makarsky. "Corporate wireless LAN security: threats and an effective security assessment framework for wireless information assurance." International Journal of Mobile Communications 4, no. 3 (2006): 266. http://dx.doi.org/10.1504/ijmc.2006.008942.
Full textEmilselvan, G. s. r., N. Gayathri, S. Rakesh Kumar, Ankush Rai, and Jagadeesh Kannan R. "ADVANCED ENCRYPTION AND EXTENDED AUTHENTICATION FOR WIRELESS LAN." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (April 1, 2017): 441. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19987.
Full textXia, Wen Yu, Kai Jun Wu, and Liang Zhou. "The Security Analysis of WLAN Protocol Based on 802.11i." Applied Mechanics and Materials 513-517 (February 2014): 628–31. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.628.
Full textKoien, G. M., and T. Haslestad. "Integration of wireless LAN and 3G wireless - Security aspects of 3g-wlan interworking." IEEE Communications Magazine 41, no. 11 (November 2003): 82–88. http://dx.doi.org/10.1109/mcom.2003.1244927.
Full textAfsar Awan, Salman, and Amer Sohail. "EXPERIMENTAL PERFORMANCE ANALYSIS OF WIRELESS LAN IEEE 802.11N SECURITY MECHANISM." Journal of Global Innovations in Agricultural and Social Sciences 2, no. 2 (June 1, 2014): 97–101. http://dx.doi.org/10.17957/jgiass/2.2.550.
Full textWang, Chang Quan. "A Security Authentication Scheme in Wireless LAN for Portable Terminal." Applied Mechanics and Materials 530-531 (February 2014): 637–40. http://dx.doi.org/10.4028/www.scientific.net/amm.530-531.637.
Full textYou, Ilsun, Yoshiaki Hori, and Kouichi Sakurai. "Towards formal analysis of wireless LAN security with MIS protocol." International Journal of Ad Hoc and Ubiquitous Computing 7, no. 2 (2011): 112. http://dx.doi.org/10.1504/ijahuc.2011.038997.
Full textSuroto, Suroto. "WLAN Security: Threats And Countermeasures." JOIV : International Journal on Informatics Visualization 2, no. 4 (June 27, 2018): 232. http://dx.doi.org/10.30630/joiv.2.4.133.
Full textPermadi, Kukuh Bagas, Henki Bayu Seta, and Ria Astriratma. "Pengamanan Jaringan Wireless LAN Dengan Protokol EAP-TTLS Dan Otentikasi MSCHAPv2 Pada Fakultas Ilmu Komputer UPN Veteran Jakarta." Informatik : Jurnal Ilmu Komputer 16, no. 2 (August 31, 2020): 95. http://dx.doi.org/10.52958/iftk.v16i2.1970.
Full textLu, Yong, Jingjing Liu, Lu Ning, and Yi Huang. "Exploration on SA Query Mechanism in IEEE 802.11w." International Journal of Interdisciplinary Telecommunications and Networking 7, no. 1 (January 2015): 13–26. http://dx.doi.org/10.4018/ijitn.2015010102.
Full textLee, Il-Gu, Kyungmin Go, and Jung Hoon Lee. "Battery Draining Attack and Defense against Power Saving Wireless LAN Devices." Sensors 20, no. 7 (April 5, 2020): 2043. http://dx.doi.org/10.3390/s20072043.
Full textSingh, Rajeev, and Teek Parval Sharma. "A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security." Wireless Personal Communications 77, no. 2 (December 20, 2013): 1145–65. http://dx.doi.org/10.1007/s11277-013-1559-0.
Full textWang, Fei, Yu Wang, and Yuan Tian. "Research of Improved Network Access Authorization Mechanism Based on Elliptic Curve." Applied Mechanics and Materials 519-520 (February 2014): 236–40. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.236.
Full textZhang, Yi Peng, Zheng Tao Jiang, and Chen Yang. "Attack and Analysis on the Vulnerability of Tenda Wireless Routers." Applied Mechanics and Materials 556-562 (May 2014): 5316–20. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.5316.
Full textKösem, Mehmet, and Ali Güneş. "Comparing Wireless LAN Standards and a Model Proposal for University Wireless Network Security with 802.1x." IARJSET 3, no. 4 (April 20, 2016): 13–17. http://dx.doi.org/10.17148/iarjset.2016.3403.
Full textFischer, D., and B. Markscheffel. "The German Wireless LAN Security Survey 2009-How Security Measures are used in Companies and." International Journal for Infonomics 3, no. 2 (June 1, 2010): 278–84. http://dx.doi.org/10.20533/iji.1742.4712.2010.0030.
Full textKumar, Dr Vinod, Mr Avtar Singh, and Mrs Ritika Narang. "PERFORMANCE ANALYSIS OF EFFECT RATE OF CROSS LAYER BASED INTRUSION DETECTION FOR WIRELESS LAN." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 2 (July 27, 2013): 80–84. http://dx.doi.org/10.24297/ijct.v5i2.3526.
Full textAthawale, S. V. "Real-time Intrusion Prevention System to Increase Computer Security in Wireless LAN." International Journal for Research in Applied Science and Engineering Technology V, no. IX (September 30, 2017): 1428–32. http://dx.doi.org/10.22214/ijraset.2017.9206.
Full textHayashi, Isao, Takashi Kobayashi, Yoshinori Arai, Toshiyuki Maeda, and Atsushi Inoue. "Optimal Location of Wireless LAN Access Points Using Fuzzy ID3." Journal of Advanced Computational Intelligence and Intelligent Informatics 13, no. 2 (March 20, 2009): 128–34. http://dx.doi.org/10.20965/jaciii.2009.p0128.
Full textOh, Hayoung. "Security-aware fair transmission scheme for 802.11 based cognitive IoT." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 3 (June 1, 2020): 2589. http://dx.doi.org/10.11591/ijece.v10i3.pp2589-2599.
Full textPark, Chang-Seop, Hyun-Sun Kang, and Jaijin Jung. "A Cross-Layer Key Management Scheme for MIPv6 Fast Handover over IEEE 802.11 Wireless LAN." Mobile Information Systems 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/708064.
Full textTrimintzios, Panagiotis, and George Georgiou. "WiFi and WiMAX Secure Deployments." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–28. http://dx.doi.org/10.1155/2010/423281.
Full textNam, Ji-Hyun, Ju-yeop Lee, Song-hui Kwon, and Hyoung-Kee Choi. "Comparative Analysis on Security Protocols of WPA3 Standard for Secure Wireless LAN Environments." Journal of Korean Institute of Communications and Information Sciences 44, no. 10 (October 31, 2019): 1878–87. http://dx.doi.org/10.7840/kics.2019.44.10.1878.
Full textDing, Ai Xia, and Wang Dan. "The Security Experience of Wireless Local Area Network at Ningbo University." Advanced Materials Research 488-489 (March 2012): 1603–8. http://dx.doi.org/10.4028/www.scientific.net/amr.488-489.1603.
Full textWibawa, Sigit. "SECURITY ARCHITECTURE ON WIRELESS NETWORK TRAFFIC HANDOFF : A REVIEW." TEKNOKOM 4, no. 2 (July 9, 2021): 43–47. http://dx.doi.org/10.31943/teknokom.v4i2.60.
Full textPETRICĂ, Gabriel. "A Study on Password Strength in Wireless Encryption Protocols." International Journal of Information Security and Cybercrime 8, no. 2 (December 27, 2019): 21–26. http://dx.doi.org/10.19107/ijisc.2019.02.02.
Full textHwang, Seong-Kyu, and Seung-Jo Han. "A Study on efficient transmission performance improvement Considering the security in the wireless LAN environment." Journal of the Korean Institute of Information and Communication Engineering 17, no. 4 (April 30, 2013): 837–46. http://dx.doi.org/10.6109/jkiice.2013.17.4.837.
Full textCHUNG, B. "A Novel (Re)Association Control Scheme for Inter-AP Security Transition in Mobile Wireless LAN." IEICE Transactions on Communications E89-B, no. 5 (May 1, 2006): 1613–19. http://dx.doi.org/10.1093/ietcom/e89-b.5.1613.
Full textHuang, Qing Fu, Jian Wu Yang, and Zhi Cheng Chen. "The Application and Design of the Smart Home Wireless Bus Protocol Based on the NRF24L01." Advanced Materials Research 271-273 (July 2011): 991–94. http://dx.doi.org/10.4028/www.scientific.net/amr.271-273.991.
Full text., Haeruddin. "Security Design And Testing of Lan and Wlan Network in Mikrotik Router Using Penetration Testing Method FROM Mitm Attack." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 4, no. 1 (July 20, 2020): 119–27. http://dx.doi.org/10.31289/jite.v4i1.3832.
Full textMano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (November 1, 2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.
Full textP, Senthilkumar, and Baskar M. "A study on mobile ad-hock networks (manets)." Journal of Management and Science 1, no. 1 (June 30, 2011): 14–20. http://dx.doi.org/10.26524/jms.2011.3.
Full text